Investigate, Don't Just Review Documents
The approach to managing electronic information in federal regulatory compliance investigations differs significantly from the approach to document review in the litigation context.
March 29, 2019 at 11:36 AM
6 minute read
The original version of this story was published on Law.com
Too many organizations approach litigation and compliance investigations the same way, using the same technology, approach and people. However, the approach to managing electronic information in federal regulatory compliance investigations differs significantly from the approach to document review in the litigation context. Understanding this difference is the key to recognizing and defining the capabilities that are necessary for effective investigations and workflow.
A litigation review is about just that: reviewing documents. Reviewers are trained to recognize documents relating to a well-developed fact pattern underlying an articulated dispute. Discovery deadlines and mountains of ESI place the emphasis on review speed and volume. Analytics play a narrow, focused role in review—devoted primarily to improving efficiency and maximizing throughput.
Investigations absolutely need to take a different tack. By comparison, developing a cogent fact pattern is the ultimate objective of an investigation, not the starting point. Investigations are about fact development through targeted document analysis, not exhaustive document review. That means a different mindset, a different approach and significantly more emphasis on effective analytics.
Why the Difference? The principal difference between a litigation review and an investigation is the lack of knowledge. An investigation is like a jigsaw puzzle with few pieces on the table—little is known at the outset. Consequently, investigators search the documents for threads, patterns and relationships that can be connected to reveal the underlying narrative.
Approaching this effort like a litigation review will stymie an investigation. Batching documents for serial review, even the “best” and most similar documents, is redundant and inefficient. There is no need to find all documents concerning any aspect of the investigation, just enough to fully answer any questions. Then move on to the next question. (Thus the need for advanced analytics to focus review on only the most critical documents.)
Leveraging Advanced Analytics Modern analytics techniques can be a scalpel in the hands of a skilled investigator, cutting through layers of irrelevant documents to reach to the heart of the inquiry. And certain analytics have proven to be particularly helpful.
Most investigations start with a mass of documents from disparate sources, with little or no organization—the inboxes of several employees from different departments, for example. Attempting to wade through that morass, even with traditional Boolean search techniques, can be a daunting and inefficient task.
To provide some structure to the collection, investigation tools rely on unsupervised machine learning techniques to group documents into labeled concepts or clusters based on semantic similarities. The labels provide a virtual table of contents, and a granular insight into the substance of the documents within the collection. Investigators can use those labels to get a sense of the nature and diversity of the collection, to make gross decisions on the probative value of individual groups, and even to direct and narrow their focus for further investigation.
State-of-the-art communication analytics provide another means of superimposing structure, and surfacing critical information early in the investigation. At the highest level, communication analytics provide a macroscopic view of the social network spanning the collection. At the individual level, this identifies personal communication patterns; at a domain level, it highlights those communications staying within, and those leaving, the organization. Digging deeper into one-to-one communications will uncover unknown witnesses or custodians that can be integrated into the investigatory process.
There are many advanced analytics techniques that can be leveraged to effectively reach the critical documents during an investigation: regex and other entity identification tools, interactive timeline controls, sentiment analysis, etc. The constant in investigations, however, is the focus on finding and analyzing only critical documents, rather than conducting an exhaustive review for tangentially related ESI.
Optimizing Technology-Assisted Review Technology-assisted review ensures a thorough document review in the litigation context. Managed properly, TAR can be an effective technique for locating pertinent documents in an investigation as well.
The right technology is critical. Continuous active learning protocols are imperative, because a CAL algorithm trains from the very first decision and returns documents that are most similar to the relevant training examples.
Training should be efficient. Once documents relevant to an inquiry are identified, they become training examples to uncover related documents. Otherwise, train with an exemplar synthetic seed—studies show that a CAL algorithm is effective with just a single training document.
Once the documents become redundant, move to the next area of inquiry. Again, unlike litigation, there is no need to find every relevant document, just enough to answer the questions.
Exploring the Unknown Every investigation suffers from the concern that there may be pertinent documents that go unseen. Advanced analytics focus the investigation on specific areas of inquiry. TAR expands the document review in those same areas. But neither technique is directed at discovering the unknown.
State-of-the-art TAR tools include functionality directed at exploring those unknown areas, by locating the documents that are most contextually diverse from everything reviewed to that point. Those documents may or may not be pertinent to the investigation, but reviewing contextually diverse documents minimizes the likelihood of missing critical information that was otherwise unknown.
Proving a Negative Finally, combining each of these techniques is one way to demonstrate that there are no (or statistically very few) pertinent documents in a collection. This step of “proving a negative” is particularly useful in responding to governmental information requests.
In reality, proving a negative requires an investigator to use every one of these techniques in a diligent effort to find responsive documents. Again, there is no need to review every document in the collection. Once enough documents have been reviewed to make a reasonable statistical showing of the paucity of responsive documents, the review can conclude.
Ultimately, an investigation is about finding critical documents, not exhaustive review. Modern e-discovery tools make that possible.
Thomas Gricks, Esq., is director, Data Analytics, Catalyst (part of OpenText). Tom advises corporations and law firms on best practices for applying TAR technology.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllPreparing for Measured, Responsible and Reasoned Consumer Welfare Policy
4 minute readThe Marble Palace Blog: The Supreme Court’s Bond With Baseball
Protecting Attorney-Client Privilege in the Modern Age of Communications
6 minute readTrending Stories
- 1GC Pleads Guilty to Embezzling $7.4 Million From 3 Banks
- 2Authenticating Electronic Signatures
- 3'Fulfilled Her Purpose on the Court': Presiding Judge M. Yvette Miller Is 'Ready for a New Challenge'
- 4Litigation Leaders: Greenspoon Marder’s Beth-Ann Krimsky on What Makes Her Team ‘Prepared, Compassionate and Wicked Smart’
- 5A Look Back at High-Profile Hires in Big Law From Federal Government
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250